main attack
- main attack的基本解释
-
-
主攻
- 相似词
- 更多 网络例句 与main attack相关的网络例句 [注:此内容来源于网络,仅供参考]
-
By analyzing the advantage and limitations of attack tree model, present a demand that we establish a new attack model for anti-attack test by integrating the attack multi-attribute classification.c Establish a penetration attack tree model for anti-attack test by integrating characteristics of multi-attribute attack classification and attack tree model, redefining attack tree nodes and redescribing the relations of them.
建立了一个面向抗攻击测试的渗透攻击模型。综合多属性攻击分类与攻击树模型的特点,通过对攻击树节点的重新定义和节点间关系的重新描述,建立了一个面向抗攻击测试的基于攻击树的渗透攻击模型。该模型能够描述渗透攻击不同阶段的特征,各种渗透攻击之间的属性关系和条件依赖关系,进而能够合理的组织渗透攻击,为渗透攻击的实施提供方案,从而满足抗攻击测试中对目标精确测试的要求。
-
The main function of this system is to implement automatic analysis of malicious codes'attacking behavior by the dynamical analyzing method. The system has the flowing characteristics: 1 Automatizing the malicious codes analyzing flow which includes the attack information collection, the attack information analysis and the attack recovery. 2 Collecting comparatively detailed attack information. 3 Detecting many kinds of automatic running techniques of malicious codes. 4 Detecting a kind of attack technique of hiding information in registration table and several kinds of attack techniques of hiding process. 5 Implementing visual show of attack reports. 6 Preventing attack from diffusing by the technique of virtual machine. 7 Detecting some new malicious codes.
该系统的主要功能是对恶意代码的攻击行为进行自动化分析,该系统采用的分析方法是一种恶意代码的动态分析方法,该系统具有以下特点:1实现了恶意代码分析流程自动化,包括攻击信息收集、攻击信息分析和攻击恢复的自动化。2收集较全面的攻击信息。3实现了对恶意代码的多种自启动技术的检测。4实现了检测一种在注册表中进行信息隐藏的攻击技术和几种进程隐藏的攻击技术。5攻击报告可视化显示。6通过虚拟机技术防止攻击扩散。7能够检测到一些新出现的恶意代码。
-
We define two security notions of identity based proxy multi-signature. One is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and a given identity attack. The other is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and an adaptive chosen-identity attack.
本文给出了基于身份的代理多重签名的两种安全定义,第一是适应性选择消息攻击,适应性选择授权文件攻击,以及给定身份攻击下的不可存在性伪造;第二是适应性选择消息攻击,适应性选择授权文件攻击,以及适应性选择身份攻击下的不可存在性伪造。
- 更多网络解释 与main attack相关的网络解释 [注:此内容来源于网络,仅供参考]
-
main attack force:主攻部队
main attack ==> 主攻 | main attack force ==> 主攻部队 | main audio track ==> 主伴音磁迹
-
win back:赢回
作为hp公司也不甘势弱,一经调整完毕,立刻也展开角逐,试图赢回(win back)丢失的客户. 一时it 硬件厂商间刮起一阵"attack"风,attack dell, attack ibm,attack hp 等步履此起彼伏. 那么如何让核心客户心甘情愿留下来,
-
power attack ; force attack:强攻
扣调整球 spike with adjusting | 强攻 power attack ; force attack | 佯攻 feint attack ; feint spike ; wave attack